|
@@ -78,8 +78,6 @@ static const struct rpc_credops gss_credops;
|
|
|
/* dump the buffer in `emacs-hexl' style */
|
|
|
#define isprint(c) ((c > 0x1f) && (c < 0x7f))
|
|
|
|
|
|
-static DEFINE_RWLOCK(gss_ctx_lock);
|
|
|
-
|
|
|
struct gss_auth {
|
|
|
struct rpc_auth rpc_auth;
|
|
|
struct gss_api_mech *mech;
|
|
@@ -88,7 +86,7 @@ struct gss_auth {
|
|
|
struct dentry *dentry;
|
|
|
};
|
|
|
|
|
|
-static void gss_destroy_ctx(struct gss_cl_ctx *);
|
|
|
+static void gss_free_ctx(struct gss_cl_ctx *);
|
|
|
static struct rpc_pipe_ops gss_upcall_ops;
|
|
|
|
|
|
static inline struct gss_cl_ctx *
|
|
@@ -102,20 +100,24 @@ static inline void
|
|
|
gss_put_ctx(struct gss_cl_ctx *ctx)
|
|
|
{
|
|
|
if (atomic_dec_and_test(&ctx->count))
|
|
|
- gss_destroy_ctx(ctx);
|
|
|
+ gss_free_ctx(ctx);
|
|
|
}
|
|
|
|
|
|
+/* gss_cred_set_ctx:
|
|
|
+ * called by gss_upcall_callback and gss_create_upcall in order
|
|
|
+ * to set the gss context. The actual exchange of an old context
|
|
|
+ * and a new one is protected by the inode->i_lock.
|
|
|
+ */
|
|
|
static void
|
|
|
gss_cred_set_ctx(struct rpc_cred *cred, struct gss_cl_ctx *ctx)
|
|
|
{
|
|
|
struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
|
|
struct gss_cl_ctx *old;
|
|
|
- write_lock(&gss_ctx_lock);
|
|
|
+
|
|
|
old = gss_cred->gc_ctx;
|
|
|
- gss_cred->gc_ctx = ctx;
|
|
|
+ rcu_assign_pointer(gss_cred->gc_ctx, ctx);
|
|
|
set_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
|
|
|
clear_bit(RPCAUTH_CRED_NEW, &cred->cr_flags);
|
|
|
- write_unlock(&gss_ctx_lock);
|
|
|
if (old)
|
|
|
gss_put_ctx(old);
|
|
|
}
|
|
@@ -126,10 +128,10 @@ gss_cred_is_uptodate_ctx(struct rpc_cred *cred)
|
|
|
struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
|
|
int res = 0;
|
|
|
|
|
|
- read_lock(&gss_ctx_lock);
|
|
|
+ rcu_read_lock();
|
|
|
if (test_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags) && gss_cred->gc_ctx)
|
|
|
res = 1;
|
|
|
- read_unlock(&gss_ctx_lock);
|
|
|
+ rcu_read_unlock();
|
|
|
return res;
|
|
|
}
|
|
|
|
|
@@ -168,10 +170,10 @@ gss_cred_get_ctx(struct rpc_cred *cred)
|
|
|
struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
|
|
struct gss_cl_ctx *ctx = NULL;
|
|
|
|
|
|
- read_lock(&gss_ctx_lock);
|
|
|
+ rcu_read_lock();
|
|
|
if (gss_cred->gc_ctx)
|
|
|
ctx = gss_get_ctx(gss_cred->gc_ctx);
|
|
|
- read_unlock(&gss_ctx_lock);
|
|
|
+ rcu_read_unlock();
|
|
|
return ctx;
|
|
|
}
|
|
|
|
|
@@ -333,11 +335,11 @@ gss_upcall_callback(struct rpc_task *task)
|
|
|
struct gss_upcall_msg *gss_msg = gss_cred->gc_upcall;
|
|
|
struct inode *inode = gss_msg->auth->dentry->d_inode;
|
|
|
|
|
|
+ spin_lock(&inode->i_lock);
|
|
|
if (gss_msg->ctx)
|
|
|
gss_cred_set_ctx(task->tk_msg.rpc_cred, gss_get_ctx(gss_msg->ctx));
|
|
|
else
|
|
|
task->tk_status = gss_msg->msg.errno;
|
|
|
- spin_lock(&inode->i_lock);
|
|
|
gss_cred->gc_upcall = NULL;
|
|
|
rpc_wake_up_status(&gss_msg->rpc_waitqueue, gss_msg->msg.errno);
|
|
|
spin_unlock(&inode->i_lock);
|
|
@@ -440,7 +442,6 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred)
|
|
|
prepare_to_wait(&gss_msg->waitqueue, &wait, TASK_INTERRUPTIBLE);
|
|
|
spin_lock(&inode->i_lock);
|
|
|
if (gss_msg->ctx != NULL || gss_msg->msg.errno < 0) {
|
|
|
- spin_unlock(&inode->i_lock);
|
|
|
break;
|
|
|
}
|
|
|
spin_unlock(&inode->i_lock);
|
|
@@ -454,6 +455,7 @@ gss_create_upcall(struct gss_auth *gss_auth, struct gss_cred *gss_cred)
|
|
|
gss_cred_set_ctx(cred, gss_get_ctx(gss_msg->ctx));
|
|
|
else
|
|
|
err = gss_msg->msg.errno;
|
|
|
+ spin_unlock(&inode->i_lock);
|
|
|
out_intr:
|
|
|
finish_wait(&gss_msg->waitqueue, &wait);
|
|
|
gss_release_msg(gss_msg);
|
|
@@ -681,9 +683,9 @@ gss_destroy(struct rpc_auth *auth)
|
|
|
* to create a new cred or context, so they check that things have been
|
|
|
* allocated before freeing them. */
|
|
|
static void
|
|
|
-gss_destroy_ctx(struct gss_cl_ctx *ctx)
|
|
|
+gss_do_free_ctx(struct gss_cl_ctx *ctx)
|
|
|
{
|
|
|
- dprintk("RPC: gss_destroy_ctx\n");
|
|
|
+ dprintk("RPC: gss_free_ctx\n");
|
|
|
|
|
|
if (ctx->gc_gss_ctx)
|
|
|
gss_delete_sec_context(&ctx->gc_gss_ctx);
|
|
@@ -692,12 +694,23 @@ gss_destroy_ctx(struct gss_cl_ctx *ctx)
|
|
|
kfree(ctx);
|
|
|
}
|
|
|
|
|
|
+static void
|
|
|
+gss_free_ctx_callback(struct rcu_head *head)
|
|
|
+{
|
|
|
+ struct gss_cl_ctx *ctx = container_of(head, struct gss_cl_ctx, gc_rcu);
|
|
|
+ gss_do_free_ctx(ctx);
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+gss_free_ctx(struct gss_cl_ctx *ctx)
|
|
|
+{
|
|
|
+ call_rcu(&ctx->gc_rcu, gss_free_ctx_callback);
|
|
|
+}
|
|
|
+
|
|
|
static void
|
|
|
gss_free_cred(struct gss_cred *gss_cred)
|
|
|
{
|
|
|
dprintk("RPC: gss_free_cred %p\n", gss_cred);
|
|
|
- if (gss_cred->gc_ctx)
|
|
|
- gss_put_ctx(gss_cred->gc_ctx);
|
|
|
kfree(gss_cred);
|
|
|
}
|
|
|
|
|
@@ -711,7 +724,13 @@ gss_free_cred_callback(struct rcu_head *head)
|
|
|
static void
|
|
|
gss_destroy_cred(struct rpc_cred *cred)
|
|
|
{
|
|
|
+ struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
|
|
|
+ struct gss_cl_ctx *ctx = gss_cred->gc_ctx;
|
|
|
+
|
|
|
+ rcu_assign_pointer(gss_cred->gc_ctx, NULL);
|
|
|
call_rcu(&cred->cr_rcu, gss_free_cred_callback);
|
|
|
+ if (ctx)
|
|
|
+ gss_put_ctx(ctx);
|
|
|
}
|
|
|
|
|
|
/*
|